Research article Special Issues

Security protection using two different image shadows with authentication

  • Received: 07 November 2018 Accepted: 27 December 2018 Published: 07 March 2019
  • Secret sharing is an important technique for security protection for multimedia information communication by dividing a secret message into several shadows that are held among a set of participants. In this paper, we introduce a novel secret image sharing (SIS) scheme using two meaningful digital images with cheating detection. It allows a dealer to share a secret message into two different meaningful images through the guidance of the turtle shell magic matrix. Then, after performing a permutation operation, two meaningful shadow images are generated and distributed to two participants. The secret message can be reconstructed only when both participants cooperate by releasing real shadow images. Honest participant in the proposed scheme can easily detect whether the other participant is cheating via presenting a fake shadow. Experimental results show that this method ensures high quality of shadow images and good embedding capacity. The cheating detection process is also effective and easy to implement.

    Citation: Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang. Security protection using two different image shadows with authentication[J]. Mathematical Biosciences and Engineering, 2019, 16(4): 1914-1932. doi: 10.3934/mbe.2019093

    Related Papers:

  • Secret sharing is an important technique for security protection for multimedia information communication by dividing a secret message into several shadows that are held among a set of participants. In this paper, we introduce a novel secret image sharing (SIS) scheme using two meaningful digital images with cheating detection. It allows a dealer to share a secret message into two different meaningful images through the guidance of the turtle shell magic matrix. Then, after performing a permutation operation, two meaningful shadow images are generated and distributed to two participants. The secret message can be reconstructed only when both participants cooperate by releasing real shadow images. Honest participant in the proposed scheme can easily detect whether the other participant is cheating via presenting a fake shadow. Experimental results show that this method ensures high quality of shadow images and good embedding capacity. The cheating detection process is also effective and easy to implement.


    加载中


    [1] X. Cao, L. Du and X. Wei, et al., High capacity reversible data hiding in encrypted images by patch-level sparse representation, IEEE Trans. Cybern., 46 (2016), 1132–1143.
    [2] A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612–613.
    [3] G. R. Blakley, Safeguarding cryptographic keys, Proceedings of American Federation of Information Processing Societies National Computer Conference, New York, USA, 48 (1979), 313–317.
    [4] M. Naor and A. Shamir, Visual cryptography, Proceedings of Advances in Cryptology-Eurocrypt'94, Perugia, Italy, 1995, 1–12.
    [5] S. J. Shyu, Efficient visual secret sharing scheme for color images, Pattern Recognit., 39 (2006), 866–880.
    [6] C. N. Yang and T. S. Chen, Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation, Pattern Recognit., 39 (2006), 1300–1314.
    [7] C. N. Yang, K. H. Yu and R. Lukac, User-friendly image sharing using polynomials with different primes, Int. J. Imaging Syst. Technol., 17 (2007), 40–47.
    [8] C. C. Thien and J. C. Lin, An image-sharing method with user-friendly shadow images, IEEE Trans. Circuits Syst., 13 (2003), 1161–1169.
    [9] C. C. Chang, C.Y. Lin and C. S. Tseng, Secret image hiding and sharing based on the (t, n)-threshold, Fundam. Inform., 76 (2007), 399–411.
    [10] X. T. Wu and W. Sun, Generalized random grid and its applications in visual cryptography, IEEE Trans. Inf. Forensics Secur., 8 (2013), 1541–1553.
    [11] C. C. Chang, Y. P. Hsieh and C. H. Lin, Sharing secrets in stego images with authentication, Pattern Recognit., 41(2008), 3130–3137.
    [12] P. Y. Lin, J. S. Lee and C. C. Chang, Distortion-free secret image sharing mechanism using modulus operator, Pattern Recognit., 42 (2009), 886–895.
    [13] C. C. Chang, T. D. Kieu and Y. C. Chou, Reversible data hiding scheme using two steganographic images, Proceedings of IEEE Region 10 International Conference (TENCON), Taipei, Taiwan, 2007, 1–4.
    [14] C. Qin, C. C. Chang and T. J. Hsu, Reversible data hiding scheme based on exploiting modification direction with two steganographic images, Multimed. Tools Appl., 74 (2015), 5861–5872.
    [15] N. T. Huynh, K. Bharanitharan and C. C. Chang, Quadri-directional searching algorithm for secret image sharing using meaningful shadows, J. Vis. Commun. Image Represent., 28 (2015), 105–112.
    [16] C. C. Chang, Y. Liu and T. S. Nguyen, A novel turtle shell based scheme for data hiding, The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), Kitakyushu, Japan, 2014, 89–93.
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(3133) PDF downloads(609) Cited by(3)

Article outline

Figures and Tables

Figures(17)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog